-
1
-
-
0035147972
-
An artificial immune system model for intelligent agents
-
King R., Russ S., Lambert A., Reese D. An artificial immune system model for intelligent agents. Future Gener. Comput. Syst. 2001, 17:335-343.
-
(2001)
Future Gener. Comput. Syst.
, vol.17
, pp. 335-343
-
-
King, R.1
Russ, S.2
Lambert, A.3
Reese, D.4
-
2
-
-
77956185060
-
Agent-based artificial immune system approach for adaptive damage detection in monitoring networks
-
Chen B. Agent-based artificial immune system approach for adaptive damage detection in monitoring networks. J. Networks Comput. Appl. 2010, 33:633-645.
-
(2010)
J. Networks Comput. Appl.
, vol.33
, pp. 633-645
-
-
Chen, B.1
-
3
-
-
75149138866
-
Intelligent agent based artificial immune system for computer security-a review
-
Ramakrishnan S., Srinivasan S. Intelligent agent based artificial immune system for computer security-a review. Artif. Intell. Rev. 2009, 32:13-43.
-
(2009)
Artif. Intell. Rev.
, vol.32
, pp. 13-43
-
-
Ramakrishnan, S.1
Srinivasan, S.2
-
4
-
-
0029716418
-
-
Longstaff, A sense of self for unix processes, in: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy.
-
S. Forrest, A. Hofmeyr, T. Somayaji, Longstaff, A sense of self for unix processes, in: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120-128.
-
-
-
Forrest, S.1
Hofmeyr, A.2
Somayaji, T.3
-
5
-
-
0034300682
-
Intrusion detection using autonomous agents
-
Spafford E., Zamboni D. Intrusion detection using autonomous agents. Comput. Networks 2000, 34:547-570.
-
(2000)
Comput. Networks
, vol.34
, pp. 547-570
-
-
Spafford, E.1
Zamboni, D.2
-
6
-
-
59349106158
-
Distributed agents model for intrusion detection based on AIS
-
Yang J., Liu X., Li T., Liang G., Liu S. Distributed agents model for intrusion detection based on AIS. Knowl.-Based Syst. 2009, 22:115-119.
-
(2009)
Knowl.-Based Syst.
, vol.22
, pp. 115-119
-
-
Yang, J.1
Liu, X.2
Li, T.3
Liang, G.4
Liu, S.5
-
8
-
-
0028201732
-
Tolerance, danger and the extended family
-
Matzinger P. Tolerance, danger and the extended family. Annu. Rev. Immunol. 1994, 12:991-1045.
-
(1994)
Annu. Rev. Immunol.
, vol.12
, pp. 991-1045
-
-
Matzinger, P.1
-
9
-
-
77649237173
-
A danger theory inspired artificial immune algorithm for on-line supervised two-class classification problem
-
Zhang C., Yi Z. A danger theory inspired artificial immune algorithm for on-line supervised two-class classification problem. Neurocomputing 2010, 73:1244-1255.
-
(2010)
Neurocomputing
, vol.73
, pp. 1244-1255
-
-
Zhang, C.1
Yi, Z.2
-
11
-
-
35248825128
-
Danger theory: the link between ais and ids
-
Aickelin U., Bentley P., Cayzer S., Kim J. Danger theory: the link between ais and ids. Lect. Notes Comput. Sci. 2003, 2787:144-165.
-
(2003)
Lect. Notes Comput. Sci.
, vol.2787
, pp. 144-165
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
-
13
-
-
35449005874
-
Immune system approaches to intrusion detection-a review
-
Kim J., Bentley P., Aickelin U., Greensmith J., Tedesco G., Twycross J. Immune system approaches to intrusion detection-a review. Nat. Comput. 2007, 6:413-466.
-
(2007)
Nat. Comput.
, vol.6
, pp. 413-466
-
-
Kim, J.1
Bentley, P.2
Aickelin, U.3
Greensmith, J.4
Tedesco, G.5
Twycross, J.6
-
14
-
-
69849112918
-
An agent-based classification model
-
in: Ninth European Agent Systems Summer School (EASSS2007).
-
F. Gu, U. Aickelin, J. Greensmith, An agent-based classification model, in: Ninth European Agent Systems Summer School (EASSS2007).
-
-
-
Gu, F.1
Aickelin, U.2
Greensmith, J.3
-
15
-
-
45849105605
-
An artificial immune system model for multi agents based resource discovery in distributed environments
-
in: Proceedings of the First International Conference on Innovative Computing, Information and Control.
-
K.-W. Yeom, J.-H. Park, An artificial immune system model for multi agents based resource discovery in distributed environments, in: Proceedings of the First International Conference on Innovative Computing, Information and Control, pp. 234-239.
-
-
-
Yeom, K.-W.1
Park, J.-H.2
-
16
-
-
66249108974
-
Integrating innate and adaptive immunity for worm detection
-
in: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining.
-
J. Zhang, Y. Liang, Integrating innate and adaptive immunity for worm detection, in: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, pp. 693-696.
-
-
-
Zhang, J.1
Liang, Y.2
-
17
-
-
52249123251
-
Multi-agents artificial immune system (MAAIS) inspired by danger theory for anomaly detection
-
in: International Conference on Computational Intelligence and Security Workshops.
-
H. Fu, X. Yuan, N. Wang, Multi-agents artificial immune system (MAAIS) inspired by danger theory for anomaly detection, in: 2007 International Conference on Computational Intelligence and Security Workshops, pp. 570-573.
-
(2007)
, pp. 570-573
-
-
Fu, H.1
Yuan, X.2
Wang, N.3
-
19
-
-
34548453089
-
An agent based and biological inspired real-time intrusion detection and security model for computer network operations
-
Boukerche A., Machado R., Juca K., Sobral J., Motare M. An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Comput. Commun. 2007, 20:2649-2660.
-
(2007)
Comput. Commun.
, vol.20
, pp. 2649-2660
-
-
Boukerche, A.1
Machado, R.2
Juca, K.3
Sobral, J.4
Motare, M.5
-
20
-
-
84860231343
-
-
Integrating Artificial Immune Algorithms for Intrusion Detection, Ph.D. Thesis, University College London
-
J. Kim, Integrating Artificial Immune Algorithms for Intrusion Detection, Ph.D. Thesis, University College London, 2002.
-
(2002)
-
-
Kim, J.1
-
21
-
-
68349160839
-
Information fusion for anomaly detection with the dendritic cell algorithm
-
Greensmith J., Aickelin U., Tedesco G. Information fusion for anomaly detection with the dendritic cell algorithm. Inf. Fusion 2010, 11:21-34.
-
(2010)
Inf. Fusion
, vol.11
, pp. 21-34
-
-
Greensmith, J.1
Aickelin, U.2
Tedesco, G.3
-
22
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
Harmer P., Williams P., Gunsch G., Lamont G. An artificial immune system architecture for computer security applications. IEEE Trans. Evol. Comput. 2002, 65:252-280.
-
(2002)
IEEE Trans. Evol. Comput.
, vol.65
, pp. 252-280
-
-
Harmer, P.1
Williams, P.2
Gunsch, G.3
Lamont, G.4
|